11.
    发明专利
    未知

    公开(公告)号:AT340458T

    公开(公告)日:2006-10-15

    申请号:AT03720747

    申请日:2003-05-06

    Applicant: IBM

    Abstract: In accordance with the preferred embodiment, an access point provides dynamic load balancing of network bandwidth between access points within the 802.11 wireless LAN. The access point uses the RTS/CTS protocol to reduce the bandwidth available to a single device using an excessive amount of network bandwidth. The access point places a device that has been monopolizing a network channel on a Restricted List, and regulates bandwidth on the network by not returning a CTS to any client on the Restricted List. When the client's network usage drops below a policy driven threshold set by the number of network users, the client is removed from the list and the access point will respond to a RTS from the client with a CTS.

    13.
    发明专利
    未知

    公开(公告)号:DE69908245D1

    公开(公告)日:2003-07-03

    申请号:DE69908245

    申请日:1999-06-24

    Applicant: IBM

    Abstract: A system for monitoring tamper events in a computer system 10 is disclosed. The computer system is on a network. The system comprises a tamper realtime clock (RTC) means 140 which receives at least one tamper event signal from the computer system. The tamper RTC includes a timer 178 for indicating the time of a tamper event and a management device 160 for receiving the at least one tamper event signal. The management device issues a command to the tamper RTC means to obtain the time of the at least one tamper event. The management device also generates a network packet 200 which includes the time of the tamper event to a system administrator of the network. Preferably the computer system has the ability to functionally detect and store the time of a tamper event. A tamper real time clock (RTC) circuit is operatively connected with logic to store the date and time of an event as it occurs. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when a cover on the computer system is removed. The computer system also sends network alerts when the cover is removed.

    Method and system for secure computer system transfer

    公开(公告)号:GB2351821B

    公开(公告)日:2003-10-29

    申请号:GB0007190

    申请日:2000-03-27

    Applicant: IBM

    Abstract: Method and system aspects for securely transferring a computer system are described. A computer system is disabled at a shipping point via an RFID (radio frequency identification) interface and re-enabled at a receiving point via the RFID interface. Disabling the computer system includes selecting a boot password, writing the boot password to storage in the computer system via the RFID interface, and setting a disable bit in the storage via the, RFID interface. Re-enabling the computer system includes entering the boot password via the RFID interface and clearing the disable bit.

Patent Agency Ranking